US8260935B2 - Error control terminal discovery and updating - Google Patents
Error control terminal discovery and updating Download PDFInfo
- Publication number
- US8260935B2 US8260935B2 US12/019,297 US1929708A US8260935B2 US 8260935 B2 US8260935 B2 US 8260935B2 US 1929708 A US1929708 A US 1929708A US 8260935 B2 US8260935 B2 US 8260935B2
- Authority
- US
- United States
- Prior art keywords
- terminal
- error control
- packet
- control protocol
- aware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 claims abstract description 131
- 239000000523 sample Substances 0.000 claims description 72
- 238000012545 processing Methods 0.000 claims description 43
- 230000004044 response Effects 0.000 claims description 38
- 230000005540 biological transmission Effects 0.000 claims description 25
- 230000003139 buffering effect Effects 0.000 claims description 24
- 230000001960 triggered effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 52
- 238000004891 communication Methods 0.000 abstract description 31
- 238000001514 detection method Methods 0.000 abstract description 11
- 230000007246 mechanism Effects 0.000 abstract description 7
- 238000010586 diagram Methods 0.000 description 32
- 239000000872 buffer Substances 0.000 description 23
- 101000741965 Homo sapiens Inactive tyrosine-protein kinase PRAG1 Proteins 0.000 description 14
- 102100038659 Inactive tyrosine-protein kinase PRAG1 Human genes 0.000 description 14
- 102100036409 Activated CDC42 kinase 1 Human genes 0.000 description 13
- 230000000977 initiatory effect Effects 0.000 description 8
- 230000002441 reversible effect Effects 0.000 description 7
- 230000035945 sensitivity Effects 0.000 description 6
- 230000002452 interceptive effect Effects 0.000 description 4
- 230000006735 deficit Effects 0.000 description 3
- 238000005538 encapsulation Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000000750 progressive effect Effects 0.000 description 3
- 230000003247 decreasing effect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000005641 tunneling Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
- H04L1/18—Automatic repetition systems, e.g. Van Duuren systems
- H04L1/1829—Arrangements specially adapted for the receiver end
- H04L1/1835—Buffer management
- H04L1/1841—Resequencing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/1853—Satellite systems for providing telephony service to a mobile station, i.e. mobile satellite service
- H04B7/18539—Arrangements for managing radio, resources, i.e. for establishing or releasing a connection
- H04B7/18543—Arrangements for managing radio, resources, i.e. for establishing or releasing a connection for adaptation of transmission parameters, e.g. power control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L2001/0092—Error control systems characterised by the topology of the transmission link
- H04L2001/0097—Relays
Definitions
- the present invention relates to error control for communications in general and, in particular, to error control enhancements for satellite communications.
- nuclear scintillation and “communications on the move” (COTM) related impairments may result in packet losses or other errors that are not sufficiently cured by such techniques. This may be particularly true in urban areas, where man-made structures (e.g., buildings, bridges, etc.) may impede signals as COTM terminals move about. Such blockages may negatively affect communications performance in terrestrial wireless systems also.
- COTM nuclear scintillation and “communications on the move”
- Novel error detection and retransmission systems, methods, devices, and software are described. These processes may be implemented on intermediate communication links between two end terminals, wherein the intermediate links are via satellite. Error control mechanisms to detect and retransmit lost or corrupted frames may be implemented at the network layer. Processes for discovering and updating error control protocol-aware terminals are described, as well. Features of these error control processes may include a configurable delay limit, tailored to traffic type or class.
- a transmitting terminal with an ARQ unit receives an IP packet with a destination IP address.
- the transmitting terminal may not be aware of the correspondence between the destination IP address and the particular receiving terminal (and associated ARQ unit).
- the transmitting terminal sends a probe packet with an ARQ identifier to the destination IP address, and the receiving terminal intercepts the probe using the identifier.
- the receiving terminal responds, and the ARQ table for each terminal is updated.
- Other methods and systems are also described for updating ARQ tables. When users move between terminals, the ARQ tables in the terminals identifying their location may be updated to allow continued error control between terminals in a mobile environment.
- a first ARQ-aware terminal maintains a listing of associations between each of a number of different destination network addresses and corresponding ARQ-aware terminals.
- the first ARQ-aware terminal processes a data packet to be forwarded to the first destination network address, but determines that the first destination network address is not associated in the listing with an ARQ-aware terminal.
- the first terminal may transmit a probe packet on the routing path to the first destination network address, the probe packet including an identifier formatted to be recognized by an ARQ-aware terminal.
- a second ARQ-aware terminal on the routing path between the first ARQ-aware terminal and the end terminal captures the probe packet based on the identifier.
- the second ARQ-aware terminal transmits a response packet identifying itself and the probe packet, the response packet including information for updating the listing of associations with an association between the first destination network address and the second ARQ-aware terminal.
- FIG. 1 is a block diagram of a satellite communications system configured according to various embodiments of the invention.
- FIG. 2 is a block diagram of a satellite communications system, illustrating selected devices and components for terminal to terminal communication, configured according to various embodiments of the invention.
- FIG. 3 is a block diagram of a satellite communications system, illustrating selected devices and components for satellite to terminal communication, configured according to various embodiments of the invention.
- FIG. 4A is a block diagram illustrating an example of the protocol layering for certain packet formatting occurring on a series of links according to various embodiments of the invention.
- FIG. 4B is a block diagram illustrating an example of the frame structure for certain error control transmissions at the network layer according to various embodiments of the invention.
- FIG. 4C is a block diagram illustrating an alternative example of the frame structure for certain error control transmissions at the network layer according to various embodiments of the invention.
- FIG. 5A is a block diagram illustrating an example of the protocol layering for certain packet formatting occurring between HAIPE terminals according to various embodiments of the invention.
- FIG. 5B is a block diagram illustrating an example of the frame structure for certain error control transmissions at the network layer between HAIPE terminals according to various embodiments of the invention.
- FIG. 6 is a block diagram illustrating an example of the frame structure for certain error control transmissions between the network layer and the data link layer according to various embodiments of the invention.
- FIG. 7A is a flowchart illustrating a method of transmitting error control information to a receiving terminal according to various embodiments of the invention.
- FIG. 7B is a flowchart illustrating a method of transmitting error control information and managing associated buffers according to various embodiments of the invention.
- FIG. 8A is a flowchart illustrating a method of receiving and responding to error control information from a transmitting terminal according to various embodiments of the invention.
- FIG. 8B is a flowchart illustrating a method of receiving and responding to error control information and managing associated buffers according to various embodiments of the invention.
- FIG. 9 is a block diagram illustrating a table associating destination network addresses with error control terminals according to various embodiments of the invention.
- FIG. 10 is packet flow diagram illustrating a terminal discovery process between two terminals according to various embodiments of the invention.
- FIG. 11A is packet flow diagram illustrating a terminal discovery process for a mobile host environment according to various embodiments of the invention.
- FIG. 11B is packet flow diagram illustrating an alternative terminal discovery process for a mobile host environment according to various embodiments of the invention.
- FIG. 12A is a flowchart illustrating a method of transmitting a terminal discovery probe packet according to various embodiments of the invention.
- FIG. 12B is a flowchart illustrating a method of receiving a terminal discovery probe packet according to various embodiments of the invention.
- FIG. 12C is a flowchart illustrating a method of updating error control terminal associations according to various embodiments of the invention.
- FIG. 12D is a flowchart illustrating an alternative method of updating error control terminal associations according to various embodiments of the invention.
- FIG. 13A is a flowchart illustrating a method of establishing error control communications between terminals in a mobile host environment according to various embodiments of the invention.
- FIG. 13B is a flowchart illustrating a method of updating terminal associations for error control communications between terminals in a mobile host environment according to various embodiments of the invention.
- FIG. 14 is a block diagram illustrating a table associating different types of traffic content with delay limits for error control terminals according to various embodiments of the invention.
- FIG. 15 is packet flow diagram illustrating a range of options for packet retransmission according to various embodiments of the invention.
- FIG. 16A is a flowchart illustrating a method of setting delay limits for error control retransmissions according to various embodiments of the invention.
- FIG. 16B is a flowchart illustrating a method of setting delay limits for error control retransmissions based on traffic content according to various embodiments of the invention.
- FIG. 17A is a flowchart illustrating a method of setting buffering time limits at receiving terminals according to various embodiments of the invention.
- FIG. 17B is a flowchart illustrating a method of setting and monitoring time limits for missing packets at receiving terminals according to various embodiments of the invention.
- Novel error detection and retransmission processes for communication systems are described.
- these processes are implemented on intermediate communication links between two end terminals, wherein the intermediate links are via satellite.
- error control mechanisms to detect and retransmit lost or corrupted frames are implemented at the network layer.
- processes for discovering and updating error control protocol-aware terminals are described.
- features of these error control processes include a configurable delay limit, which may be tailored to traffic type or class.
- FIG. 1 a block diagram is shown illustrating a satellite communications system 100 with various links 120 in which the error control communications described herein may be implemented.
- the system 100 includes a satellite 105 , in communication with various fixed terminals 110 and COTM terminals 115 .
- one or more of the error control processes are implemented in the network layer of a link 120 - d between a satellite 105 and a COTM terminal 115 - c (in either direction).
- the error control processes are implemented in the network layer of a link 120 - b between a first COTM terminal 115 - a and a second COTM terminal 115 - b .
- the error control processes are implemented in the network layer of a link 120 - c between a COTM terminal 115 - b and a fixed terminal 110 - b (in either direction).
- error control processes may be implemented in links (not shown) between two fixed terminals 110 , between a satellite 105 and fixed terminal 110 , or other combinations, as well. It is also worth noting that these error control mechanisms may be implemented within a network layer carrying encrypted data that is transported via IP tunneling. In some embodiments, the error control processes described herein are implemented between the network and data link layers. In still other embodiments, aspects of the error control communications (e.g., delay limits) described herein may be implemented at the data link or transport layers.
- terminals include “ARQ units,” which may be integrated processing units at a terminal allowing a terminal to create, transmit, and identify the error control packets described herein, and engage in the ARQ sessions described.
- the ARQ units may buffer data from ARQ packets at the transmit end until reception is confirmed or a timeout occurs.
- the error control processes described herein may be made up of error control techniques to identify lost or damaged packets, and then retransmit identified packets if an applicable delay timer has not expired.
- error control techniques may be referred to herein as ARQ error control mechanisms, or simply as ARQ.
- packets are retransmitted only in response to specific NACKs identifying a missing packet or set of packets.
- a hybrid scheme is used which is made up of a generalized retransmission strategy, in which selective retransmission and Go-Back-N retransmission are two particular cases.
- An entire spectrum of behaviors between selective retransmission and Go-Back-N can be realized by suitably configuring the size of buffers available at the receiver for saving out-of-sequence packets, and otherwise setting forth parameters for detection and transmission based on a variety of factors.
- the receiver saves received packets in a buffer (e.g., for an amount of time associated with the delay limit), and thereby allows for delivery of packets in sequence even when they are received out of order.
- a transmitting terminal with an ARQ unit receives an IP packet with a destination IP address.
- the transmitting terminal may not be aware of the correspondence between the destination IP address and the particular receiving terminal (and associated ARQ unit).
- the transmitting terminal may send a probe packet with an ARQ identifier to the destination IP address, and the receiving terminal intercepts the probe using the identifier.
- the receiving terminal responds, and the ARQ table for each terminal is updated.
- Methods and systems are also described for updating ARQ tables. When users move between terminals, the ARQ tables in the terminals identifying their location may be updated to allow continued error control between terminals in a dynamic environment.
- features of these error control mechanisms include a configurable delay limit tailored to traffic type or class.
- TPv4 and TPv6 packets each include a one byte Type of Service (ToS) or Differentiated Services (DiffServ) field.
- This field may be used to indicate the underlying service being transported.
- the field could be used to define the delay sensitivity of the frame being transported.
- Frames with different delay sensitivities e.g., UDP v. TCP packets, voice v. e-mail
- multiple different ARQ sessions with differing delay limits may take place concurrently between terminals (or between a terminal and a satellite).
- a receiver may be configured to transmit NACKs (and, possibly, ACKs) on a periodic basis.
- a receiver may receive a polling request (e.g., a status request) from a transmitter to initiate the transmission, or may initiate the NACKs internally.
- the internally or externally initiated polling period may be configurable based on a number of factors (e.g., particular terminals involved, estimated RTT, network error rate, link load, receipt of out-of-sequence packets, type or quality of service, etc.).
- the polling period may be decreased (i.e., increasing the regularity of the ACK/NACK transmissions) when traffic is light.
- retransmission is based only on NACKs, and this may decrease the number of unnecessary retransmissions.
- progressive retransmission schemes may be used under severely degraded link conditions.
- Progressive transmission is a process which may be used if a given frame is unsuccessfully transmitted a certain number of times (e.g., 3 unsuccessful transmissions). After this threshold is reached, more than one copy of the frame is transmitted, with the retransmitted frames spaced in time. This progressive retransmission puts additional burden on bandwidth, but may be useful in severely degraded link environments in lighter traffic periods.
- the threshold, the number of packets retransmitted, and the timing increments may be configurable.
- FIG. 2 a block diagram is shown illustrating an example configuration 200 for certain devices of the satellite communications system 100 of FIG. 1 . While the example configuration illustrates communication between a COTM terminal 115 and fixed terminal 110 , those skilled in the art will recognize that similar components may be used between other links for the same or other types of terminals, or between a satellite and a terminal.
- an initiating terminal 205 transmits data via a network (e.g., the Internet or a wireless local area network (LAN)) to the COTM terminal 115 - b .
- the data is received by the COTM terminal 115 - b .
- the COTM terminal 115 - b is made up of a network layer processing unit 215 (including a routing unit 220 , an ARQ unit 225 and an IP Encapsulation Unit 230 ), a data link layer processing unit 235 , an RF frontend 240 , and other components known in the art.
- the received data may, for example, be an IP packet carried by a wireless signal.
- the IP packet may be received by the routing unit 220 of the network layer processing unit 215 .
- the routing unit 220 may evaluate the destination address of the received IP packet, and recognize that it will be forwarded to a similar error control protocol-aware terminal, such as fixed terminal 110 - b (e.g., through the satellite 105 via link 120 - c ).
- This lookup functionality may be achieved by having the routing unit 220 maintain or otherwise access a table that lists certain destination IP or other addresses that are associated with ARQ units.
- the routing unit 220 may make a threshold determination as to whether the IP packet is directed to or through a node that can engage in an ARQ session at the IP layer, as described herein.
- the network layer processing unit 215 may assign processing responsibilities for the received IP packet to an ARQ unit 225 .
- the ARQ unit 225 may create an ARQ header to be associated with the received IP packet, the ARQ header including sequence number, session number, a timestamp, a retransmission delay limit, buffering time limits for a receiving terminal, and other information and/or identifiers for error detection.
- the ARQ unit 225 may evaluate a Type of Service indicator in the received IP packet, and place the packet in the appropriate session based on the type of service (e.g., UDP v. TCP).
- the ARQ unit 225 may buffer the data packet to be transmitted until acknowledgement information is received and/or processed to determine whether the data packet was received.
- the ARQ unit 225 may buffer the data packet (allowing for possible retransmission) until a delay timer expires, and then discard the packet.
- An IP encapsulation unit 230 may then encapsulate the ARQ header in an additional IP header, and append its associated IP packet, indicating in this IP header that it is an ARQ IP packet.
- the indicator in the additional IP header may be used as a signal to other error control protocol-aware terminals that the packet includes an ARQ header and is to be processed by a receiving ARQ unit at the network layer.
- error control protocol-aware terminal or “network layer error control protocol-aware terminal” may describe a terminal configured with an ARQ unit similar to ARQ unit 225 , and located on the routing path to a destination network address.
- the IP encapsulation unit 230 may forward the ARQ packet to the data link layer processing unit 235 , where a data link protocol (e.g., HDLC) is applied.
- a data link protocol e.g., HDLC
- the link layer packet is then processed by RF frontend 240 , and transmitted via a wireless signal through the satellite 105 to the fixed terminal 110 - b.
- the fixed terminal 110 - b receives the signal.
- the fixed terminal 110 - b in this embodiment is made up of an RF frontend 245 , data link layer processing unit 250 , and a network layer processing unit 255 (including an IP decapsulation unit 260 , routing unit 265 , and ARQ unit 270 ).
- Its RF frontend 245 may downconvert, amplify, and demodulate the signal, thereby reproducing the link layer packet from the COTM terminal 115 - b .
- the received link layer packet header is generated by the satellite.
- the data link layer processing unit 250 of the fixed terminal 110 - b may process the received packet, as known in the art, to produce the ARQ IP packet.
- An IP decapsulation unit 260 may receive the ARQ IP packet, process the identifier in the header to recognize the packet as an ARQ IP packet, and forward it to the ARQ unit 270 for processing.
- the ARQ unit 270 of the receiving fixed terminal 110 - b may analyze a sequence number, timestamp, retransmission delay limit, time limit for buffering, and any additional error control information from the ARQ header created by the ARQ unit 225 of the COTM terminal 115 - b .
- the ARQ unit 270 of the fixed terminal 110 - b may analyze this error control information, in light of other ARQ packets received from the session, and transmit acknowledgement information (ACKs, NACKs, and/or other status information) to the ARQ unit 225 of the COTM terminal 115 - b .
- acknowledgement information ACKs, NACKs, and/or other status information
- the ARQ unit 270 of the fixed terminal 110 - b may generate a response packet with the acknowledgement information in response to the received error control header, and the acknowledgement information may be encapsulated at the network layer.
- the response packet may be forwarded to the data link layer processing unit 250 , where a data link protocol (e.g., HDLC) is applied.
- the link layer packet is then processed by RF frontend 245 , and transmitted via a wireless signal through the satellite 105 back to the ARQ unit 225 of the COTM terminal 115 - b .
- the COTM terminal 115 - b upon receiving acknowledgement information that includes a NACK, may retransmit the buffered data packets (perhaps on the condition that time remains for an applicable delay limit).
- the ARQ unit 270 of the receiving fixed terminal 110 - b may determine that the data packet is an out-of-sequence data packet, and buffer the packet until preceding data packets are received and forwarded to the end terminal (or a time limit based on a delay limit expires).
- the ARQ unit 270 may wait to forward the buffered data packet to the end terminal until determining the data packet has become an in-sequence data packet, and that the intervening packets have been forwarded.
- a buffered data packet may be retained until a buffering time limit is exceeded or neared (e.g., when a discard or forwarding time is specified for immediately before the time limit expires).
- the buffered data packet may then be forwarded out-of-sequence and then discarded.
- the IP decapsulation unit 260 identified the packet as a non-ARQ IP packet, other components (not shown) of the network layer processing unit 255 of the fixed terminal 110 - b may otherwise process the packet at the IP layer).
- the ARQ unit 270 processing may further process and/or forward the packet out of the fixed terminal 110 - b .
- the data which originated at initiating terminal 205 , and was routed through the COTM terminal 115 - b , satellite 105 , and fixed terminal 110 - b , may then be passed through a network 210 to an end terminal 275 .
- the initiating terminal 205 and the end terminal 275 may each be remote from the COTM terminal 115 - b and fixed terminal 110 - b , thus the link may be an intermediate link within the end to end connection.
- the initiating terminal 205 may also buffer the first data packet until an acknowledgement is received from the end terminal 275 (e.g., using a distinct TCP connection to provide multiple error control links).
- an acknowledgement is received from the end terminal 275 (e.g., using a distinct TCP connection to provide multiple error control links).
- FIG. 3 a block diagram is shown illustrating an example configuration 300 of components for the satellite communications system 100 of FIG. 1 .
- the diagram illustrates certain differences from the terminal-to-terminal processing described above.
- the ARQ unit is located on the satellite 105 , which communicates with a COTM terminal 115 - c over link 120 - d .
- the satellite 105 includes an ARQ unit 305 , a data link layer processing unit 310 , a transmitter 315 , and may include other components known in the art.
- data is received by the satellite, perhaps from a fixed terminal 110 .
- the received data may, for example, include an IP packet carried by a wireless signal.
- the IP packet may be received by the ARQ unit 305 .
- the ARQ unit 305 may evaluate a destination (IP or other) address associated with the received IP packet, and recognize that it will be passing through the ARQ-aware COTM terminal 115 - c , via link 120 - d .
- This lookup functionality could be achieved by having the ARQ unit 305 maintain or otherwise access a table that lists MAC addresses or other terminal addresses that are associated with ARQ units capable of ARQ sessions according to particular embodiments of the invention.
- the ARQ unit 305 may create an ARQ header to be associated with the received IP packet, the ARQ header including a sequence number, a session identifier, a timestamp, time and/or delay limits, and other information for error detection.
- the ARQ unit 305 may place the packet in an appropriate session based on the type of service (e.g., real-time interactive v. email). In this way, packets with different delay sensitivities or quality of service guarantees may have different delay timers, buffer or window sizes, polling timers, etc., and these parameters may be isolated to the satellite to terminal links.
- the ARQ unit 305 may forward the ARQ header and associated IP packet to the data link layer processing 310 unit, where a data link protocol (e.g., HDLC) is applied, encapsulating the ARQ header and associated IP packet.
- a data link protocol e.g., HDLC
- the error control data is located between the network and data link layers.
- the link layer packet is then processed by the transmitter 315 , and sent via a wireless signal through the satellite 105 to the COTM terminal 115 - c.
- the COTM terminal 115 - c receives the signal.
- the COTM terminal 115 - c in this embodiment is made up of an RF frontend 245 , a data link layer processing unit 250 , an ARQ unit 320 , and a network layer processing unit 255 (including an IP decapsulation unit 260 ).
- Its RF frontend 245 may downconvert, amplify, and demodulate the signal, thereby producing the link layer packet from the satellite 105 .
- the data link layer processing unit 250 of the COTM terminal 115 - c may process the received packet, as known in the art, to produce the ARQ header and associated IP packet.
- the data link layer processing unit 250 may recognize an identifier in the data link layer header, and forward the packet to the ARQ unit 320 for processing.
- the ARQ unit 320 may analyze the sequence number, timestamp, and other information, in light of other ARQ packets received from the session. The ARQ unit 320 may then transmit ACKs, NACKs, and other status information to the ARQ unit 305 of the satellite 105 .
- a network layer processing unit 255 may receive the IP packet, and the IP decapsulation unit 260 may process the packet as a regular IP packet, and forward the packet out of the COTM terminal 115 - c (e.g., the packet, without its ARQ header, may be processed by the IP decapsulation unit 260 ). Other components may further process and/or forward the packet out of the COTM terminal 115 - b , to then be passed through a network 210 to an end terminal 275 .
- the error control data may be encapsulated at the network layer, in other embodiments the error control data may be encapsulated between the network layer and data link layers. In still other embodiments, certain aspects of the error control protocols described herein may be implemented at the data link layer or transport layer, for example.
- the description with reference to FIG. 3 is directed at a link from a satellite 105 to a COTM terminal 115
- the session at issue may also be from the COTM terminal 115 to the satellite 105 , wherein the ARQ header formatting is applied at the COTM terminal 115 , and then received and processed at the satellite 105 . According to the embodiment described with reference to FIG.
- the satellite 105 may, therefore, operate as a receiver and transmitter for the same IP packet (e.g., with a COTM terminal 115 - a to satellite 105 link, and then from the satellite 105 to COTM terminal 115 - b link).
- IP packet e.g., with a COTM terminal 115 - a to satellite 105 link, and then from the satellite 105 to COTM terminal 115 - b link.
- the above description is directed at the link between a satellite 105 and COTM terminal 115 , a similar process and components may be applied to other satellite 105 to fixed terminal 110 links 120 - a , as well, or in a number of other terminal to terminal connections.
- a fixed terminal 110 COTM terminal 115 , or satellite 105 of FIG. 2 or 3 may be implemented, in whole or in part, in hardware.
- they may each be made up of one, or more, Application Specific Integrated Circuits (ASICs) adapted to perform a subset of the applicable functions in hardware.
- ASICs Application Specific Integrated Circuits
- the functions may be performed by one or more other processing units (or cores), on one or more integrated circuits.
- other types of integrated circuits may be used (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays (FPGAs), and other Semi-Custom ICs), which may be programmed in any manner known in the art.
- Each may also be implemented, in whole or in part, with instructions embodied in a memory, formatted to be executed by one or more general or application specific processors.
- the tables described above may be stored in local memory.
- FIG. 4A a block diagram is shown illustrating an example of the protocol layering for certain packet formatting 400 occurring on a series of links between two users 205 , 275 .
- an intermediate link 120 (e.g., from the system 100 of FIG. 1 ) is between a COTM terminal 115 and a fixed terminal 110 .
- FIG. 4A illustrates the physical layer 404 , data link layer 408 , network layer 412 , and transport and application layer 416 processing that may occur at each user terminal 205 , 275 , HAIPE terminal 402 , intermediate terminal 110 , 115 , or satellite 105 .
- FIG. 4A illustrates the physical layer 404 , data link layer 408 , network layer 412 , and transport and application layer 416 processing that may occur at each user terminal 205 , 275 , HAIPE terminal 402 , intermediate terminal 110 , 115 , or satellite 105 .
- ARQ error control data may be created at the COTM terminal 115 IP layer 420 , and be processed at the IP layer 424 by the receiving fixed terminal 110 .
- ARQ operates over a terminal to terminal IP tunnel.
- the illustrated packet formatting may take place between other terminal to terminal or terminal to satellite connections.
- FIG. 4B a block diagram is shown illustrating an example of the frame structure 425 for various embodiments of the invention. This may, for example, be the frame format generated at the COTM terminal 115 , as set forth the FIG. 4A .
- a COTM terminal 115 may receive a HAIPE encrypted IP packet 430 encapsulated by an unencrypted IP header 435 - a , thereby forming a payload made up of an IP packet 440 (note that in other embodiments, other types of packets could be received or otherwise created at the COTM terminal 115 to form the payload; e.g., the payload could be an IP packet encapsulating an IPSEC encrypted packet, or some other IP packet carrying an unencrypted payload).
- the COTM terminal 115 includes an ARQ unit (e.g., the ARQ unit 225 shown in FIG. 2 ) configured to encapsulate the received IP packet 440 to form an expanded IP packet 445 (or, in other embodiments, this may be some other network layer packet format).
- This expanded IP packet 445 contains a second outer IP header 450 with a field indicating that it is an ARQ packet and specifying the IP address (e.g., for an end user 275 ).
- the IP packet 445 also includes an ARQ header 455 (e.g., a 4 byte ARQ header) which may contain a sequence number, a timestamp, session number, and other information for error detection.
- the expanded IP packet 445 is then encapsulated in an HDLC header 460 (or other data link layer protocol), to form a data link layer HDLC packet 465 .
- This packet is then transported, via the satellite, to the fixed terminal 110 , which includes another ARQ unit (e.g., the ARQ unit 270 at the fixed terminal 110 - b shown in FIG. 2 ).
- the fixed terminal 110 processes the IP header 450 for the expanded IP packet 445 and, recognizing that it is an ARQ packet, forwards it to an ARQ unit therein.
- the ARQ unit at the fixed terminal 110 may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer. In this way, the ARQ processing units at the COTM terminal 115 and the fixed terminal 110 may perform the error control functionality at the IP layer via the satellite 105 .
- the ARQ unit (e.g., ARQ unit 270 ) at the receiving fixed terminal 110 may respond with acknowledgement information (ACKs, NACKs, or other status reports) or session initiation responses transmitted at the network layer to the ARQ unit (e.g., ARQ unit 225 ) at the transmitting COTM terminal 115 .
- acknowledgement information ACKs, NACKs, or other status reports
- session initiation responses transmitted at the network layer to the ARQ unit (e.g., ARQ unit 225 ) at the transmitting COTM terminal 115 .
- the payload 440 need not be aware of the ARQ functionality.
- the data link layer i.e., the HDLC layer
- the ARQ unit at the COTM terminal 115 may retransmit lost or damaged packets after receiving the appropriate ACKs or NACKs, if the delay limit (as applicable) is not exceeded given the applicable type of service.
- the ARQ unit e.g., ARQ unit 225 or 270
- the ARQ unit may be configured to apply the additional IP layer ( 420 , 424 ) only when a packet is destined for a terminal with an ARQ unit with IP layer functionality.
- the COTM terminal 115 may maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once.
- control packet 470 may be sent on forward or reverse links.
- the ARQ unit may be implemented in a box outside of the COTM terminal (e.g., between the HAIPE terminal and COTM terminal).
- the terminal to terminal link may be between fixed terminals 110 , COTM terminals 115 , or any alternative combination thereof.
- FIG. 4C a block diagram is shown illustrating an alternative example of the frame structure 475 for various embodiments of the invention. This may, for example, be the frame format processed between terminals (e.g., the terminals 110 , 115 set forth in FIG. 4A ).
- a COTM terminal 115 again receives a HAIPE encrypted IP packet 430 appended to an unencrypted IP header 435 - b , thereby forming a payload made up of an IP packet 440 (again note that in other embodiments, other types of packets could be received or otherwise created at the COTM terminal 115 to form the payload, e.g., the payload could be an IP packet encapsulating an IPSEC encrypted packet, or some other IP packet carrying an unencrypted payload).
- the COTM terminal 115 includes an ARQ unit (e.g., ARQ unit 225 of FIG. 2 ) configured to insert or otherwise include an ARQ header 480 (e.g., a 4 byte ARQ header) between the unencrypted IP header 435 - b and the ESP header.
- the ARQ header may contain a sequence number, a timestamp, session number, and other information for error detection.
- the expanded IP packet 485 is then encapsulated in a HDLC header 460 (or other data link layer protocol) to form a data link layer HDLC packet 490 .
- This packet is then transported, via the satellite 105 , to the fixed terminal 110 , which includes another ARQ unit (e.g., the ARQ unit 270 shown in FIG. 2 ).
- the fixed terminal 110 processes the IP header 435 - b for the expanded IP packet 485 and, recognizing that it is an ARQ packet (because it is so indicated in the header), forwards it to its ARQ unit therein.
- the ARQ unit at the fixed terminal 110 may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer. Response or other acknowledgement packets may similarly be transported in the reverse direction at the IP layer, as well.
- the ARQ protocol described herein may operate in non-tunneled mode, and the ARQ overhead may be decreased from an extra 40 bytes (e.g., with IPv6) to an extra four bytes in this example.
- the encrypted payload 430 need not be aware of the ARQ functionality.
- the data link layer i.e., the HDLC layer
- the ARQ unit at the COTM terminal 115 may retransmit lost or damaged packets after receiving the appropriate ACKs or NACKs, if the delay limit is not exceeded given the applicable type of service.
- An ARQ unit e.g., ARQ unit 225 or 270
- the COTM terminal 115 may again maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once. Note that a format for a control packet 495 is illustrated as well, which may be sent on forward or reverse links.
- FIG. 5A a block diagram is shown illustrating an example of certain packet formatting 500 which occurs on a series of links between two users 205 , 275 .
- An intermediate link 530 is illustrated.
- the communication passes from a user 205 , through a HAIPE terminal 520 - a (which includes an ARQ unit), a first intermediate terminal 115 , a satellite 105 , a second intermediate terminal 110 , and then on through a second HAIPE terminal (which includes an ARQ unit) 520 - b .
- FIG. 5A illustrates the physical layer 504 , data link layer 508 , network layer 512 , and transport and application layer 516 processing that occurs at each device or set of devices.
- the ARQ error control frame may be created at the IP layer 524 by a HAIPE terminal 528 outside of the intermediate terminal-to-terminal connections described above, passing in encrypted form through the intermediate terminals and satellite, and be processed at the IP layer 528 of a receiving HAIPE terminal 520 - b .
- the illustrated packet formatting may take place with one, or more, other types of terminals outside of the terminal to satellite to terminal connections described above.
- FIG. 5B a block diagram is shown illustrating an example of a frame structure 535 for various embodiments of the invention.
- a HAIPE terminal HAIPE terminal 524 receives an unencrypted IP packet 540 .
- the HAIPE terminal 524 may evaluate the destination address of the received IP packet and recognize that it will be forwarded to a similar ARQ aware HAIPE terminal 528 (through the satellite 105 ).
- This lookup functionality could be achieved by having an ARQ unit in the HAIPE terminal maintain or otherwise access a table that lists certain IP or other addresses that are associated with ARQ units.
- the HAIPE terminal 520 - a includes an ARQ unit configured to append or otherwise associate an ARQ header 545 (e.g., a 4 byte ARQ header) onto the IP packet 540 .
- the ARQ header 545 may contain a sequence number, a timestamp, session number, and other information for error detection.
- the expanded packet is then encapsulated with an outer IP header 550 (or other network layer protocol), and encrypted to form an encrypted IP packet 555 with an encrypted ARQ header.
- the encrypted packet 555 is then encapsulated by an outer, unencrypted IP header 560 .
- a data link layer header 565 is added, forming a data link layer packet 570 to be transported through the network with the payload 555 encrypted.
- This layering may be used on forward and reverse links.
- the intermediate terminals (fixed 110 and/or COTM 115 ) and satellite 105 need not be aware of the contents of the encrypted ARQ packet.
- the HAIPE terminal 520 - b on the receiving end decrypts the packet 555 , and recognizes that it is an ARQ packet (because the protocol value field therein so indicates).
- the HAIPE terminal forwards it to an ARQ unit therein.
- the ARQ unit at the HAIPE terminal 520 - b may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer.
- the intermediate terminals need not be aware of the ARQ functionality.
- the ARQ unit at the transmitting HAIPE terminal 520 - a may retransmit lost or damaged packets after receiving the appropriate ACKs, or NACKs from the receiving HAIPE terminal 520 - b , if the delay limit is not exceeded given the applicable type of service.
- the HAIPE terminal 520 - a may maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once.
- control packet 575 may be also sent on forward or reverse links.
- the ARQ unit at a terminal may have a number of different sessions depending on the type of service or QoS features of the packet. Different types and qualities of service may be configured to have error control sessions at different terminals.
- the HAIPE terminal—HAIPE terminal link may be between other terminals.
- ARQ units e.g., the ARQ units ( 225 , 270 , 320 ) of FIGS. 2 and 3 ) or other processing units in a terminal may maintain tables that link destination IP addresses (or other destination addresses) with other ARQ units. For each ARQ unit in a table, there may be an additional correspondence with a particular session number or other identifier.
- an IP packet e.g., the IP packet 440 of FIG. 4B or 4 C
- an ARQ unit e.g., the ARQ unit 225 at COTM terminal 115 - b of FIG. 2
- a table may be accessed to identify a receiving ARQ unit corresponding to the destination IP address.
- a Type of Service field in the received IP packet may be accessed, and this field may be used to identify the appropriate session for the IP packet.
- the transmitting ARQ unit may append an outer IP header (e.g., IP header 550 ) and an ARQ header (e.g., 545 ) at the network layer, thereby encapsulating the received IP packet.
- a session identifier, sequence number, and other error control information may be included in the ARQ header, and the packet may thus be transmitted to the receiving ARQ unit at the IP layer.
- a block diagram is shown illustrating an example of the frame structure 600 for various embodiments of the invention.
- This may, for example, be the frame format processed at the satellite 105 , as set forth in FIG. 3 (or used in the reverse direction).
- a satellite 105 may receive a HAIPE encrypted IP packet 605 encapsulated by an unencrypted IP header 610 , thereby forming a payload made up of an IP packet 615 (note that in other embodiments, other types of packets could be received or otherwise created at the satellite to form the payload, e.g., the payload could be an IP packet encapsulating an IPSEC encrypted packet, or some other IP packet carrying an unencrypted payload).
- the satellite 105 includes an ARQ unit (e.g., the ARQ unit 320 shown in FIG. 3 ) configured to append or otherwise include an ARQ header 620 (e.g., a 4 byte ARQ header) onto the IP packet 615 .
- the ARQ header 620 may contain a sequence number, a timestamp, a session number, delay and/or time limits, and other information for error detection.
- the expanded packet 630 is then encapsulated in a HDLC header 625 (or other data link layer protocol) to form a data link layer HDLC packet 635 .
- This packet is then transported to the terminal 110 , 115 , which includes another ARQ unit (e.g., the ARQ unit 320 at the COTM terminal 115 - c shown in FIG. 3 ).
- the COTM terminal 115 - c processes the HDLC header for the packet 635 , recognizing that it is an ARQ packet (because the protocol value field therein so indicates), and forwards it to the ARQ unit.
- the ARQ unit at the COTM terminal 115 - c may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer.
- the payload 615 need not be aware of the ARQ functionality.
- the ARQ unit at the satellite may retransmit lost or damaged packets after receiving the appropriate ACKs or NACKs, if the delay limit is not exceeded given the applicable type of service.
- the ARQ unit may be configured to apply the ARQ header 620 only when a packet is destined for a terminal with an ARQ unit with IP layer functionality.
- the satellite 105 may maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once.
- a format for a control packet 640 is illustrated as well, and it may be sent on forward or reverse links.
- the ARQ unit may be implemented in a box outside of the terminal (e.g., between the HAIPE terminal and COTM terminal 115 ).
- the session at issue may also be from the COTM terminal 115 to the satellite 105 , wherein the ARQ header formatting is applied at the COTM terminal 115 , and then received and processed at the satellite 105 .
- the satellite 105 may, therefore, operate as a receiver and transmitter for the same IP packet (e.g., with a COTM terminal 115 - a to satellite 105 link, and then from the satellite 105 to COTM terminal 115 - b link).
- the satellite/terminal link may be between a satellite and a fixed terminal as well.
- FIG. 7A is a flowchart illustrating a method 700 of transmitting error control information to a receiving terminal according to various embodiments of the invention.
- the method 700 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a first data packet is processed, the first data packet destined for an end terminal via an intermediate terminal.
- a first error control header is generated for the first data packet.
- the first error control header is encapsulated for transmission at the network layer appended to the first data packet.
- a second data packet appended to a second error control header is received, the second data packet and appended second error control header transmitted from the intermediate terminal in response to the first error control header.
- the second error control header is encapsulated for transmission at the network layer, and includes acknowledgement information for receipt of the first data packet.
- FIG. 7B is a flowchart illustrating a method 725 of transmitting error control information and managing associated buffers according to various embodiments of the invention.
- the method 700 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a first data packet is received from a remotely located initiating terminal, the first data packet destined for a remote end terminal via an intermediate terminal.
- a table of associations is maintained, the associations relating destination network addresses to network layer error control protocol-aware terminals.
- the first data packet is identified, via the table, as a data packet that will pass through a network layer error control aware terminal, wherein the network layer error control aware terminal is the intermediate terminal.
- the first data packet is buffered.
- a first error control header is generated for the first data packet.
- the first error control header is encapsulated for transmission at the network layer appended to the first data packet.
- the first data packet and appended first error control header are transmitted to the remotely located intermediate terminal via satellite.
- a second data packet and appended second error control header are received, the second data packet and appended second error control header transmitted from the intermediate terminal in response to the first error control header.
- the second error control header is encapsulated for transmission at the network layer, and includes acknowledgement information for the first data packet.
- the buffered first data packet is discarded after processing the acknowledgement information from the received second error control header to determine whether the buffered data packet is to be retransmitted.
- FIG. 8A is a flowchart illustrating a method 800 of receiving error control information from a transmitting terminal according to various embodiments of the invention.
- the method 800 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a first data packet and appended first error control header are received, the first error control header encapsulated at the network layer.
- error control information in the first error control header is analyzed.
- a second error control header is generated including acknowledgement information in response to the analyzed error control information.
- the second error control header is encapsulated for transmission at the network layer appended to a second data packet.
- FIG. 8B is a flowchart illustrating a method 825 of receiving and responding to error control information and managing associated buffers according to various embodiments of the invention.
- the method 825 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a first data packet appended to a first error control header is received via satellite, the first error control header encapsulated at the network layer.
- the first error control header is identified as data generated by a network layer error control protocol-aware terminal, wherein the network layer error control aware terminal is a terminal between an initiating terminal and an end receiving terminal.
- error control information in the first error control header is analyzed to identify the first data packet as an out-of-sequence packet.
- the first data packet is buffered based on the analysis of the first error control header indicating the first data packet is an out-of-sequence data packet.
- a second error control header including sequencing and acknowledgement information (e.g., identifying received and missing packets) is generated in response to the analyzed error control information.
- the second error control header is encapsulated for transmission at the network layer appended to a second data packet.
- the second error control header and the appended second data packet are transmitted, via the satellite, the transmission directed to the network layer error control protocol-aware terminal.
- the buffered first data packet is forwarded to a remotely located end terminal upon determining the first data packet has become an in-sequence data packet. In other embodiments, the forwarding may occur after a buffering time expires or before a buffering time is set to expire. At block 870 , the buffered first data packet is discarded after it is forwarded.
- a transmitting terminal with an ARQ unit typically receives a data packet with a destination network address.
- the routing unit 220 may evaluate the destination network address of the received data packet to determine whether it will be forwarded to a similar ARQ-aware fixed terminal 110 - b (e.g., through the satellite 105 via link 120 - c ).
- This lookup functionality may be achieved by maintaining a listing of associations between each of a number of destination network addresses and one or more error control protocol-aware terminals.
- the routing unit 220 of FIG. 2 may maintain or otherwise access a table in a memory that lists certain destination network addresses that are associated with ARQ units.
- FIG. 9 an example of such a table 900 is shown, associating IP addresses with network layer error control protocol-aware terminal.
- the left column lists a number of destination IP addresses 905 , while the right column sets forth the network layer error control protocol-aware terminals 910 associated with each listed IP address.
- This type of table 900 may, for example, be used when an error control protocol-aware terminal (e.g., a fixed terminal 110 or COTM terminal 115 of FIG. 1 or 2 ) is deciding whether to perform the ARQ error control processing described herein.
- an error control protocol-aware terminal e.g., a fixed terminal 110 or COTM terminal 115 of FIG. 1 or 2
- the transmitting terminal may not be aware of the correspondence between the destination network address and the particular receiving terminal (and associated ARQ unit).
- the transmitting terminal may send a probe packet with a probe packet identifier to the destination IP address to discover such a terminal, and the receiving terminal captures the probe based on the identifier.
- the receiving terminal responds, and the ARQ table for each terminal is updated. Methods and systems are also described for updating ARQ tables. When users move between terminals, the ARQ tables in the terminals identifying their location may be updated to allow continued error control between terminals in a dynamic environment.
- FIG. 10 is a packet flow diagram 1000 illustrating an example flow of packets between the COTM terminal 115 - b and fixed terminal 110 - b of FIGS. 1 and 2 , according to an embodiment of the invention.
- the discovery process may occur between other error control protocol-aware terminals or nodes in a network.
- the COTM terminal 115 - b receives a user packet 1005 with a source and destination IP address from a user 205 .
- the COTM terminal 115 - b accesses a table (e.g., accessing table 900 of FIG. 9 using ARQ unit 225 of FIG. 2 ) to determine whether there is a terminal (and possibly session identifier) that is associated with the destination IP address. Not finding such an entry, the COTM terminal 115 - b formats and forwards a probe packet 1010 (referred to as an ARQ-DS-REQ packet in FIG. 10 ).
- This packet 1010 may, for example, be formatted as the ARQ packet 445 or control packet 470 of FIG.
- probe IP packet 1010 There is an indicator in the probe IP packet 1010 that it is a probe packet (or more generally, an ARQ packet), and this indicator may be in the “Next Protocol Field” of the probe IP packet 1010 (this indicator, therefore, may be referred to herein as an “identifier” or “probe packet identifier”). This identifier is formatted to allow a next error control protocol-aware terminal to identify and capture terminal information in the probe packet 1010 .
- the COTM terminal 115 - b may also forward the received user packet 1005 (without the error control processes described herein). It may also hold the received user packet 1005 in a buffer until the listing is updated with a receiving terminal entry for the destination network address, or until an ARQ session is established.
- the probe packet 1010 may be configured to carry the IP packet 1005 as its payload, and thus the probe packet 1010 may include the user packet 1005 .
- the probe packet 1010 is received, and may be captured based on the identifier.
- the probe packet 1010 is processed, and the fixed terminal 110 - b recognizes the packet as a probe packet, identifying the source IP address and the COTM terminal 115 - b .
- the fixed terminal 110 - b may then update its own ARQ table, thereby associating the source IP address with the COTM terminal 115 - b .
- the fixed terminal formats and transmits a response packet 1015 (referred to as an ARQ-DS-Response packet in FIG. 10 ).
- This packet 1015 may be formatted as the ARQ packet 445 or 485 or control packet 470 or 495 of FIG. 4B or 4 C (with the destination IP address the same as the source IP address of the received IP packet 1005 , or perhaps the IP address of the COTM terminal 115 - b ). There is another identifier in the response packet 1015 that it is a response packet, and this indicator may be in the “Next Protocol Field” of the response packet 1015 .
- the COTM terminal 115 - b then receives the response packet 1015 , and updates its ARQ table to associate the fixed terminal 110 - b with the destination IP address of the IP packet 1005 .
- the COTM terminal 115 - b (perhaps with its ARQ unit) may then access a table to determine whether there is a session corresponding to the COTM terminal 115 - b to fixed terminal 110 - b link, and whether that session may be applicable to the type or quality of service associated with an IP packet to be sent to over the link.
- the COTM terminal 115 - b formats and forwards a session establishment IP packet 1020 (referred to as an ARQ-Open packet in FIG. 10 ).
- This packet 1020 may be formatted as the ARQ packet 445 or 485 or control packet 470 or 490 of FIG. 4B or 4 C, with the destination IP address the same as the destination IP address of the user packet 1005 or the fixed terminal 110 - b .
- the fixed terminal 110 - b may then receive the session establishment packet 1020 , and create a session entry associated with the content classification of the data packet (e.g., based on whether the user packet is audio or video, streaming or interactive, and on quality of service requirements, or other).
- the fixed terminal 110 - b formats and forwards a session ACK packet 1025 (referred to as an ARQ-Open Ack packet in FIG. 10 ).
- This packet 1025 may, as above, be formatted as the ARQ packet or ARQ control packet (with the destination IP address the same as the source IP address of the user packet 1005 , or perhaps the IP address of the COTM terminal 115 - b ).
- the COTM terminal 115 - b receives and processes the session ACK packet 1025 , and the session is thereby established.
- the COTM terminal 115 - b may transmit the buffered data packet 1030 with appended error control data along the routing path toward the destination network address.
- the transmitted error control data may include a sequence number and an identifier to allow the fixed terminal 110 - b to capture the error control data.
- the data packet may be integrated into the probe packet 1010 , or may be received separately by the by fixed terminal 110 - b .
- the data packet will, regardless of how it is received, be transmitted 1035 to the end terminal 275 .
- the fixed terminal 110 - b may further respond by transmitting acknowledgement information back to the COTM terminal 115 - b , and the acknowledgement information may include the sequence number.
- ARQ units e.g., the ARQ units ( 225 , 265 , 305 , 320 ) of FIGS. 2 and 3
- tables e.g., table 900 of FIG. 9
- FIG. 9 the movement of a user from a first terminal to a second terminal.
- 11A is a packet flow diagram 1100 illustrating the flow of packets between the COTM terminal 115 - b a first fixed terminal 110 - b , and a second fixed terminal 110 - a of FIG. 1A , according to an embodiment of the invention.
- the host mobility process may occur between other terminals or nodes in a network.
- the COTM terminal 115 - b receives a user packet 1105 with a source and destination IP address.
- the COTM terminal 115 - b accesses a table (e.g., table 900 of FIG. 9 using ARQ unit 225 of FIG. 2 ) to determine whether there is a terminal (and possibly session identifier) that is associated with the destination IP address and packet type. Finding such an entry, the COTM terminal 115 - b formats and forwards a modified user packet 1110 (e.g., as an ARQ IP packet 445 of FIG. 4B with the user packet 1105 as payload).
- a modified user packet 1110 e.g., as an ARQ IP packet 445 of FIG. 4B with the user packet 1105 as payload.
- the ARQ IP packet 1110 is received.
- the ARQ IP packet 1110 is processed, and the fixed terminal 110 - b recognizes the packet as an ARQ packet.
- the fixed terminal 110 - b determines that the destination host (of user packet 1105 ) is no longer accessible (e.g., by accessing its own ARQ table, or otherwise receiving data indicating no reachability). this may be because the host moved 1102 to a second fixed terminal 110 - a .
- the fixed terminal 110 - b may update its own ARQ table if necessary (associating the COTM terminal 115 - b with the source IP address), and format and transmit an error packet 1115 (referred to as an ARQ-DS-Error packet in FIG. 11A ).
- This packet 1115 may be formatted as the control packet 470 of FIG. 4B (with the destination IP address the same as the source IP address of the user packet 1105 , or perhaps the IP address of the COTM terminal 115 - b ).
- the COTM terminal 115 - b then receives the error packet 1115 , and updates its ARQ table to end the association of the fixed terminal 110 - b with the destination IP address of the IP packet 605 .
- the COTM terminal 115 - b formats and forwards a probe IP packet 1120 (referred to as an ARQ-DS-REQ packet in FIG. 11A , and equivalent to packet 1010 of FIG. 10 ).
- This packet 1120 may be formatted as the ARQ IP packet or ARQ control packet FIG. 4B or 4 C, for example, with the destination IP address the same as the destination IP address of the originally received user packet 1105 .
- the COTM terminal 115 - b may also forward the received IP packet 1105 that has been buffered, or continue to hold it in a buffer until an ARQ session is established (alternatively, the probe packet 1120 might be configured to carry the IP packet 1105 as its payload). Other methods may be used to retransmit the originally received IP packet 1105 , as well, perhaps depending on an applicable delay limit.
- the probe IP packet 1120 is captured.
- the probe IP packet is processed, and the fixed terminal 110 - a recognizes the packet as an ARQ packet (or, possibly as an ARQ control packet) with a destination IP address for one of its reachable users.
- the fixed terminal 110 - a may then update its own ARQ table (e.g., table 900 of FIG. 9 ), thereby associating the source IP address with the COTM terminal 115 - b .
- the fixed terminal 110 - a formats and forwards a response packet 1125 (referred to as an ARQ-DS-Response packet in FIG. 11A ).
- This packet 1125 may be formatted as the ARQ packet 445 or 485 or control packet 470 or 490 of FIG. 4B or 4 C (with the destination IP address the same as the source IP address of the received IP packet 1105 , or perhaps the IP address of the COTM terminal 115 - b ). There is indicator that it is a response packet or, more generally, an ARQ packet, and this may be in the “Next Protocol Field” of the response packet 1125 .
- the COTM terminal 115 - b then receives the response packet 1125 , and updates its ARQ table to associate the fixed terminal 110 - a with the destination IP address of the IP packet 1105 .
- the COTM terminal 115 - b then proceeds to transmit one or more additional packets 1130 , using an existing session or creating a new one with fixed terminal 110 - a , as described above with reference to FIG. 10 .
- a packet flow diagram 1150 illustrates the flow of packets among the COTM terminal 115 - b , a first fixed terminal 110 - b , and a second fixed terminal 110 - a of FIG. 1 , 2 , or 3 , according to an embodiment of the invention.
- a host 1152 initially associated with the first fixed terminal 110 - b , moves to the second fixed terminal 110 - a , as had occurred in the discussion related to FIG. 11A .
- a user packet 1155 from the host (now associated with the second fixed terminal 110 - a ) is transmitted directed at the destination IP address associated with the COTM terminal 115 - b.
- the fixed terminal 110 - a then accesses a table (e.g., accessing table 900 of FIG. 9 using ARQ unit 225 of FIG. 2 ) to determine whether there is a terminal (and possibly a session identifier) that is associated with the destination IP address. If the COTM terminal 115 - b is the known associated terminal, and a session is available, the fixed terminal 110 - a may encapsulate the user packet to form an ARQ packet 1160 (e.g., ARQ packet 445 or 485 of FIG. 4B or 4 C), and transmit it to COTM terminal 115 - b . If not, the discovery process described above (related to FIG.
- the ARQ packet 1160 transmitted to the COTM terminal 115 - b may be a probe packet (e.g., a probe packet 1010 of FIG. 10 ).
- the ARQ packet 1160 reaches the COTM terminal 115 - b the ARQ table at the COTM terminal 115 - b is updated to reflect that the host IP address is now associated with fixed terminal 110 - a instead of 110 - b.
- FIG. 12A is a flowchart illustrating a method 1200 of transmitting a terminal discovery probe packet according to various embodiments of the invention.
- the method 1200 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a listing of associations (e.g., table 900 of FIG. 9 ) between each of a number of destination network addresses and one or more error control protocol-aware terminals is maintained.
- a probe packet is transmitted on the routing path to the selected destination network address, the probe packet including an identifier formatted to be recognized by a terminal configured to be error control protocol-aware.
- a response packet is received from an error control protocol-aware terminal on the routing path.
- the listing of associations is updated with an association between the selected destination network address and the error control protocol-aware terminal.
- FIG. 12B is a flowchart illustrating a method 1230 of receiving a terminal discovery probe packet according to various embodiments of the invention.
- This method 1230 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a probe packet is received at a first error control protocol-aware terminal, the probe packet transmitted from a second error control protocol-aware terminal destined for an end terminal associated with a destination network address.
- the probe packet is captured to identify the second error control protocol-aware terminal, the capture based on a probe packet identifier included in the probe packet.
- a response packet is transmitted to the second error control protocol-aware terminal identifying the probe packet, the response packet formatted with information for the second error control protocol-aware terminal to generate an association between the destination network address and the first error control protocol-aware terminal for error control communications.
- FIG. 12C is a flowchart illustrating a method 1250 of updating error control terminal associations according to various embodiments of the invention.
- the method 1250 may, again, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a listing of associations is again maintained between each of a number of destination network addresses and error control protocol-aware terminals, the listing identifying one or more error control protocol-aware terminals on respective routing paths for each destination network address.
- an entry in the listing is identified associating a selected destination network address with one of the error control protocol-aware terminals.
- a data packet is transmitted including error control data formatted to be recognized and captured by the associated error control protocol-aware terminal, the transmission based on the identification of the entry.
- a reachability packet is received from the error control protocol-aware terminal indicating that the selected destination network address has become unreachable from the error control protocol-aware terminal.
- the listing of associations is updated to remove the association between the selected destination network address and the error control protocol-aware terminal.
- FIG. 12D is a flowchart illustrating an alternative method 1280 of updating error control terminal associations according to various embodiments of the invention. As in the above examples, this method 1280 may be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a listing of associations is maintained between destination network addresses and error control protocol-aware terminals, the listing identifying a first error control protocol-aware terminal associated with a destination network address for an end terminal, the first error control protocol-aware terminal on the routing path to the end terminal.
- a reachability packet is received from a second error control protocol-aware terminal indicating that the destination network address is reachable from the second error control protocol-aware terminal.
- a second reachability packet may, but need not, be received from a first error control protocol-aware terminal, as well.
- the listing of associations is updated to remove the association between the destination network address and the first error control protocol-aware terminal and add an association between the destination network address and the second error control protocol-aware terminal.
- FIG. 13A is a flowchart illustrating a method 1300 of establishing error control communications between terminals in a mobile host environment according to various embodiments of the invention.
- This method 1300 may, as in the above examples, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a listing of associations is maintained between destination network addresses and error control protocol-aware terminals, the listing identifying error control protocol-aware terminals on respective routing paths for each destination network address.
- an entry in the listing is identified associating a first destination network address with a first error control protocol-aware terminal.
- a first data packet is transmitted including error control data formatted to be recognized and captured by the first error control protocol-aware terminal, the transmission based on the identification of the entry.
- a reachability packet is received from the first error control protocol-aware terminal indicating that the first destination network address has become unreachable is received from the first error control protocol-aware terminal.
- the listing of associations is updated to remove the association between the first destination network address and the first error control protocol-aware terminal.
- a probe packet is transmitted on the routing path to the first destination network address, the probe packet including a first identifier formatted to be recognized by a terminal configured to be error control protocol-aware.
- a response packet is received from a second error control protocol-aware terminal on the routing path in response to the probe packet.
- the listing is updated with an association between the first destination network address and the second error control protocol-aware terminal.
- a session establishment packet is transmitted to the second error control protocol-aware terminal, the session establishment packet requesting that an error control session be established based on the content classification of a data packet to be transmitted to the first destination network address via the second error control protocol-aware terminal.
- FIG. 13B is a flowchart illustrating a method 1350 of updating terminal associations for error control communications between terminals in a mobile host environment according to various embodiments of the invention.
- the method 1350 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a listing of associations is maintained between network addresses and error control protocol-aware terminals, the listing identifying error control protocol-aware terminals on respective routing paths for each network address.
- a probe packet is received from a first error control protocol-aware terminal not included in the listing, the probe packet destined for an end terminal associated with a first network address.
- the probe packet is captured to identify the first error control protocol-aware terminal and a second network address that is the source network address, the capture based on a probe packet identifier included in the probe packet.
- a response packet is transmitted to the first error control protocol-aware terminal, confirming receipt of the probe packet.
- the listing of associations is updated with an association between the second network address and the first error control protocol-aware terminal.
- the user associated with transmission from the second network address moves to be reachable from a second error control protocol-aware terminal.
- a reachability packet is received from the second error control protocol-aware terminal indicating that the second network address is reachable from the second error control protocol-aware terminal.
- the listing of associations is updated to remove the association between the second network address and the first error control protocol-aware terminal and to add an association between the second network address and the second error control protocol-aware terminal.
- features of these error control mechanisms include a configurable delay limit, which may be tailored to traffic type or class.
- TPv4 and TPv6 packets each include a one byte Type of Service (ToS) or Differentiated Services (DiffServ) field.
- This field may be used to indicate the underlying service being transported (referred to herein as the traffic content classification).
- the field could be used to define the delay sensitivity of the frame being transported.
- Frames with different delay sensitivities e.g., UDP v. TCP packets, voice v. e-mail
- multiple different ARQ sessions with differing delay limits may take place concurrently between terminals (or between a terminal and a satellite).
- a delay limit table 1400 may be stored in memory of a terminal (e.g., the fixed terminal 110 , COTM terminal 115 , or satellite 105 of FIG. 1 ), or stored elsewhere and remotely accessed.
- a first column includes a list of various traffic content classifications 1405 (streaming audio, streaming video, interactive audio, interactive video, and other data).
- traffic content classifications 1405 streaming audio, streaming video, interactive audio, interactive video, and other data.
- there are two different levels of quality of service 1410 there are two different levels of quality of service 1410 , and these may result in different delay limits. Therefore, in the illustrated embodiment, the delay limit 1415 for retransmission from a given terminal may be based on a content classification 1405 and quality of service 1410 .
- Delay limits may be also based on load at a terminal, latency at a terminal, estimated transit time to an intermediate terminal or end user, or estimated processing time at particular devices in the routing path.
- a packet flow diagram 1500 illustrating options for packet retransmission will be described.
- the illustrated diagram assumes a single delay limit (thus, it may represent a single session), but the principles may be applied to a varied delay limit environment.
- Such protocols may be used on links, for example, between a satellite 105 and a terminal ( 110 or 115 ) of FIG. 1 , or from a terminal ( 110 or 115 ) to a terminal ( 110 or 115 ) through a satellite 105 .
- there will be a transmitter 1505 and receiver 1510 of packets although a particular device (terminal or satellite) may be both a transmitter and receiver.
- a particular device terminal or satellite
- the transmitter 1505 may be the COTM terminal 115 - b
- the receiver 1510 may be the fixed terminal 110 - b
- the transmissions may, for example, be formatted as ARQ packets 445 , 485 , 555 or control packets 470 , 495 , 575 of FIG. 4B , 4 C, or 5 B.
- the transmissions in either direction are represented by the arrowed lines 1515 between transmitter 1505 and receiver 1510 .
- one or more packets are identified as packets to be transmitted with appended error control data, as described above (e.g., with reference to the routing unit 220 of FIG. 2 ).
- a packet to be transmitted is buffered and assigned a send sequence number txseq 1520 (and a delay limit may be set based on the content classification of the packet).
- a STATREQ packet 1525 is sent by the transmitter 1505 to the receiver 1510 .
- the STATREQ packet 1525 is sent without payload, but in other embodiments it may include a payload.
- the intervals between each STATREQ packet 1525 may be based on the delay limit, as well.
- This STATREQ packet 1525 may contain txTseq (the time sequence number) and txSseq (the highest sequence number sent+1).
- the STATREQ packet 1525 is also sent whenever a certain time has elapsed (e.g., 0.1 seconds) since the last STATREQ packet 1525 was sent, and some data remains unacknowledged.
- the STATREQ packet 1525 may also be sent when a certain amount of time (e.g., 5 seconds) has elapsed since the last STATREQ packet 1525 was sent, and no data remains unacknowledged. Note that within a round trip time, several STATREQ packets 1525 may be sent.
- the time sequence txTseq is maintained by the transmitter 1505 , which is incremented after each STATREQ packet 1525 is transmitted.
- the current time sequence value, txTseq may be saved locally (or, for example, at the receiver 1510 ) for each packet, when it is transmitted or retransmitted.
- the receiver 1510 When the receiver 1510 receives an out-of-sequence packet, whose sequence number is larger (in this example, by two or more sequence numbers) than the largest sequence number received, the receiver 1510 may be triggered to buffer the out-of sequence packet and to send a USTAT packet 1530 to the transmitter 1505 , the USTAT packet 1530 identifying the rxseq (the sequence number below which all packets have been received, or discarded (because the buffering time limit expired)).
- the USTAT packet 1530 may also provide spanlist information (sequence numbers or other information for the missing packet(s) and/or sequence numbers or other information for the received packet(s)).
- the rxseq and spanlist may each provide acknowledgement information (making up both ACKs and NACKs).
- the receiver 1510 When the receiver 1510 receives a STATREQ packet 1520 , it may be configured to send a STAT packet 1535 which contains rxTseq (the received time sequence number), rxseq (the sequence number below which all packets have been received), and spanlist information (sequence numbers or other information for the missing packet(s) and/or sequence numbers or other information for the received packet(s)).
- rxTseq the received time sequence number
- rxseq the sequence number below which all packets have been received
- spanlist information sequence numbers or other information for the missing packet(s) and/or sequence numbers or other information for the received packet(s)
- the transmitter 1505 When the transmitter 1505 receives a USTAT packet 1530 , it may free up buffer space (discarding the buffered data) of the acknowledged packets (and perhaps any packets for which a delay timer has expired). When the transmitter 1505 receives a USTAT packet 1535 , it may retransmit missing packets identified in the USTAT packet 1535 when the delay limit has not expired. When the transmitter 1505 receives a STAT packet 1535 , it may free up buffer space (discarding the buffered data) of the acknowledged packets (and perhaps any packets for which a delay timer has expired). The transmitter 1505 may also retransmit the missing packets identified in the STAT packet 1535 , if the delay limit has not expired.
- the transmitter 1505 response to the STAT packet 1535 is performed only if the txTseq (the time sequence number) saved for the packet is less than or equal to the rxTseq (the received time sequence number) received in the STAT packet.
- the receiver 1510 buffers out-of-sequence packets and delivers them in-sequence to the user network when missing packets arrive. The receiver 1510 then discards the buffered data packets. The receiver 1510 may also buffer the out-of-sequence packets until a time limit expires (or is about to expire), and then forward such packets out-of-sequence and discard them upon forwarding. This time limit for buffering may be received from the transmitter 1505 , or may be calculated based on the delay limit for the transmitter (e.g., by adding an estimated or average transit and processing time to the delay limit, in addition to a margin).
- a buffering time limit may be calculated or set for the receiver.
- the delay limits and time limits may take on a variety of forms, and may be calculated based on one another.
- the discarding of buffered data packets may be accomplished by freeing memory space.
- the transmitter 1505 may maintain a local sequence number (referred to hereinafter as “NA”), such that all packets below NA have been acknowledged by the receiver (or timed out because of the expiration of the delay timer).
- NA a local sequence number
- This variable may be updated by the rxSeq variable in a STAT 1535 or USTAT 1530 packet received at the transmitter.
- a spanlist may contain a compact representation of a list of sequence numbers of missing packets and a list of sequence numbers of received out-of-sequence packets, although in other embodiments some or all of this information may be represented in alternative forms.
- the retransmission protocol may operate in real-time mode (when certain delay limits are implemented), or may operate without delay limits in other embodiments. It is worth making a more detailed examination of embodiments in which delay limits are implemented.
- the transmitter 1505 may be configured with certain delay limits (e.g., hereinafter identified as a delayLimit time) for a particular ARQ session that carries real-time traffic.
- a transmitter 1505 may be configured to append a data packet header containing a field (e.g., a maxDelay field), which allows the receiver 1510 to calculate how long the packet should be buffered at the receiver 1510 .
- the transmitter 1505 may save an arrival time for the packet, and may calculate a delay limit for retransmission (hereinafter, “delayLimit”).
- delayLimit a delay limit for retransmission
- the transmitter 1505 may be configured to check whether, for example, current time ⁇ packet arrival time>delayLimit. If no, then it may set the maxDelay field to delayLimit ⁇ (current time ⁇ packet arrival time), and send the packet. If yes, then the packet will not be transmitted.
- the transmitter 1505 When the transmitter 1505 sends a STATREQ packet 1525 , it may check if there are any unacknowledged packets which have been waiting for a time equal or greater than delayLimit. If so, it may discard them (e.g., by freeing buffer space they occupy) and update NA through (or past) those packets. The NA value may be sent by the transmitter in STATREQ 1525 packets.
- the receiver 1510 when it receives an out-of-sequence packet, it may save the maxDelay field of the packet, and the packet transmit and reception times for the packet.
- the receiver may bump up the rxseq value to NA and deliver any out-of-sequence packets below NA to the network, freeing up the buffer space for the delivered packets.
- the receiver 1510 may do so based on the maxDelay field of one or more of the packets.
- a receiver 1510 may check if any out-of-sequence packets have (current time ⁇ packet transmission time)>maxDelay value of that packet. If yes, then that packet may be delivered to the network (thereby freeing up the buffer space for the delivered packets), and rxseq may be bumped up to the next missing packet.
- FIG. 16A is a flowchart illustrating a method 1600 of setting delay limits for error control retransmissions according to various embodiments of the invention.
- the method 1600 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a data packet is identified as a packet to be transmitted with appended error control data.
- a delay limit is set for error control retransmissions.
- the error control data is generated, the error control data including a time limitation for buffering of the data packet at the receiver based on the set delay limit.
- the data packet and appended error control data are transmitted.
- FIG. 16B is a flowchart illustrating an alternative method 1625 of setting delay limits for error control retransmissions based on traffic content according to various embodiments of the invention.
- the method 1625 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a number of different delay limits are established for error control retransmission, each based on traffic content classification.
- a data packet is received.
- the data packet is identified as a data packet to be transmitted with appended error control data.
- the traffic content classification is identified for the first data packet.
- a delay limit is set for error control retransmission based on the identified classification.
- the data packet is buffered, while at block 1660 , the buffered data packet is associated with the set delay limit.
- time is monitored for expiration of set delay limit, and incoming packets are monitored for receipt of acknowledgement packet (e.g., a USTAT packet 1530 or STAT packet 1535 of FIG. 15 ).
- acknowledgement packet e.g., a USTAT packet 1530 or STAT packet 1535 of FIG. 15 .
- a determination is made whether the delay limit for retransmission has expired. If not, at block 1675 , a determination is made whether an acknowledgment has been received for the data packet (e.g., from the rxseq or spanlist information of a STAT packet 1535 or a USTAT packet 1530 ). If the delay limit for retransmission has expired, or acknowledged receipt has been received for the data packet, the buffered data packet is discarded at block 1680 .
- the missing data packet may be retransmitted if a sufficient interval has elapsed at block 1690 .
- the processing then returns to block 1665 , where time is monitored for expiration of the set delay limit, and incoming packets are monitored for receipt of acknowledgement packets.
- FIG. 17A is a flowchart illustrating a method 1700 of setting buffering time limits for waiting for missing packets according to various embodiments of the invention.
- the method 1700 may, as in the above examples, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- an out-of-sequence data packet appended to error control data is received, the error control data including data for calculating a time limit for buffering the received data packet.
- the received data packet is buffered.
- the time limit is processed to determine whether the time limit for buffering the received data packet has expired.
- the buffered data packet is forwarded after the processing of the time limit.
- FIG. 17B is a flowchart illustrating a method 1725 of setting and monitoring time limits for missing packets according to various embodiments of the invention.
- the method 1700 may be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
- a data packet appended to error control data is received, the error control data including a sequence number and a time limit for buffering the received data packet.
- the received data packet is identified as an out-of-sequence data packet.
- the received data packet is buffered (note, in one embodiment in-sequence packets are simply forwarded and discarded, without waiting for missing packets).
- time is monitored for expiration of the time limit, and received packets are monitored for missing packets.
- the request for retransmission may be sent if a sufficient time for buffering remains.
- the processing then returns to block 1745 , where time is monitored for expiration of the time limit, and incoming packets are monitored for missing packets.
- the embodiments may be described as a process which is depicted as a flow diagram or block diagram. Although each may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged. A process may have additional steps not included in the figure.
- the term “memory” or “memory unit” may represent one or more devices for storing data, including read-only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices or other computer-readable mediums for storing information.
- ROM read-only memory
- RAM random access memory
- magnetic RAM magnetic RAM
- core memory magnetic disk storage mediums
- optical storage mediums flash memory devices or other computer-readable mediums for storing information.
- computer-readable medium includes, but is not limited to, portable or fixed storage devices, optical storage devices, wireless channels, a sim card, other smart cards, and various other mediums capable of storing, containing, or carrying instructions or data.
- embodiments may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof.
- the program code or code segments to perform the necessary tasks may be stored in a computer-readable medium such as a storage medium. Processors may perform the necessary tasks.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Astronomy & Astrophysics (AREA)
- Aviation & Aerospace Engineering (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
- Radio Relay Systems (AREA)
- Radio Transmission System (AREA)
- Selective Calling Equipment (AREA)
Abstract
Description
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/019,297 US8260935B2 (en) | 2007-01-24 | 2008-01-24 | Error control terminal discovery and updating |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US88634907P | 2007-01-24 | 2007-01-24 | |
US12/019,297 US8260935B2 (en) | 2007-01-24 | 2008-01-24 | Error control terminal discovery and updating |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080177884A1 US20080177884A1 (en) | 2008-07-24 |
US8260935B2 true US8260935B2 (en) | 2012-09-04 |
Family
ID=39580265
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/019,287 Active 2028-08-09 US7920477B2 (en) | 2007-01-24 | 2008-01-24 | Network layer error control systems and methods |
US12/019,297 Active 2029-11-07 US8260935B2 (en) | 2007-01-24 | 2008-01-24 | Error control terminal discovery and updating |
US12/019,292 Active 2028-12-16 US7881205B2 (en) | 2007-01-24 | 2008-01-24 | Configurable delay limit for error control communications |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/019,287 Active 2028-08-09 US7920477B2 (en) | 2007-01-24 | 2008-01-24 | Network layer error control systems and methods |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/019,292 Active 2028-12-16 US7881205B2 (en) | 2007-01-24 | 2008-01-24 | Configurable delay limit for error control communications |
Country Status (6)
Country | Link |
---|---|
US (3) | US7920477B2 (en) |
EP (1) | EP2119085B1 (en) |
CN (1) | CN101641898A (en) |
AT (1) | ATE485646T1 (en) |
DE (1) | DE602008003100D1 (en) |
WO (1) | WO2008092023A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220014500A1 (en) * | 2018-02-28 | 2022-01-13 | Palo Alto Networks, Inc. | Identifying security risks and enforcing policies on encrypted/encoded network communications |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2119085B1 (en) | 2007-01-24 | 2010-10-20 | ViaSat, Inc. | Enhanced error control communication systems and methods |
JP2009135772A (en) * | 2007-11-30 | 2009-06-18 | Oki Semiconductor Co Ltd | Router device |
US20100023842A1 (en) * | 2008-07-25 | 2010-01-28 | Nortel Networks Limited | Multisegment loss protection |
US8457048B2 (en) * | 2009-08-31 | 2013-06-04 | Research In Motion Limited | Methods and apparatus to avoid mobile station transmission of duplicate event-based and polled acknowledgments |
WO2011096009A1 (en) * | 2010-02-02 | 2011-08-11 | 株式会社 東芝 | Wireless device and wireless system |
US8806287B1 (en) * | 2010-09-24 | 2014-08-12 | Google Inc. | Retransmission systems and methods in reliable streaming protocols using connection characteristics |
CN101944974A (en) * | 2010-09-28 | 2011-01-12 | 北京邮电大学 | Efficient content distributing technology of satellite network |
CN103327647B (en) * | 2010-10-29 | 2016-03-30 | 华为技术有限公司 | The delayed release method and apparatus of Temporary Block Flow |
CN102231687A (en) * | 2011-06-29 | 2011-11-02 | 华为技术有限公司 | Method and device for detecting link failure |
US20130039192A1 (en) * | 2011-08-08 | 2013-02-14 | Renesas Mobile Corporation | Methods, Apparatus and Wireless Device for Transmitting and Receiving Data Blocks |
KR101808644B1 (en) | 2011-08-29 | 2017-12-21 | 한국전자통신연구원 | Method for detecting return link packet error in satellite communication systems |
CN102339071B (en) * | 2011-08-31 | 2013-03-06 | 桂林电子科技大学 | System and method for tracking communication in moving monopulse angle |
EP2615749B1 (en) * | 2011-12-20 | 2017-12-06 | Thales Alenia Space Schweiz AG | Method for optical data transmission from low earth orbit to earth and corresponding communication system |
US10009445B2 (en) * | 2012-06-14 | 2018-06-26 | Qualcomm Incorporated | Avoiding unwanted TCP retransmissions using optimistic window adjustments |
JP6089518B2 (en) * | 2012-09-11 | 2017-03-08 | 富士通株式会社 | Transfer device, transfer method, and transfer program |
US9363226B2 (en) * | 2013-09-05 | 2016-06-07 | International Business Machines Corporation | Method for double IP address recovery |
US9787852B2 (en) * | 2014-06-04 | 2017-10-10 | Alcatel-Lucent Usa Inc. | Sequence number reuse for CDR transport using GTP' |
US20160013976A1 (en) * | 2014-07-14 | 2016-01-14 | Futurewei Technologies, Inc. | Wireless Through Link Traffic Reduction |
FR3029371B1 (en) * | 2014-11-28 | 2016-12-23 | Thales Sa | METHOD AND SYSTEM FOR COMMUNICATING IN A SATELLITE / TERRESTRIAL HYBRID NETWORK |
CN104767559B (en) * | 2015-04-07 | 2017-10-24 | 苏州大学 | A kind of method for routing under the distributed interim networking scene of group of stars network |
CN104734770B (en) * | 2015-04-07 | 2017-11-21 | 苏州大学 | A kind of distributed group of stars network route method based on context |
WO2016180946A1 (en) * | 2015-05-13 | 2016-11-17 | Lantiq Beteiligungs-GmbH & Co.KG | Packet aggregation communication device and method |
US11575910B2 (en) * | 2020-04-09 | 2023-02-07 | Qualcomm Incorporated | Video aware transmission and multiple input multiple output layer processing |
US11245741B2 (en) | 2020-04-09 | 2022-02-08 | Qualcomm Incorporated | Video aware multiplexing for wireless communication |
US11831933B2 (en) | 2020-04-09 | 2023-11-28 | Qualcomm Incorporated | Video aware transmission and processing |
CN114189564A (en) * | 2020-08-28 | 2022-03-15 | 华为技术有限公司 | Message transmission method, device and system |
Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5109384A (en) | 1988-11-02 | 1992-04-28 | Tseung Lawrence C N | Guaranteed reliable broadcast network |
US5617561A (en) | 1994-12-22 | 1997-04-01 | International Business Machines Corporation | Message sequence number control in a virtual time system |
US5629948A (en) * | 1993-07-22 | 1997-05-13 | Ntt Mobile Communications Network Inc. | Data transmission scheme with automatic repeat request |
US5930233A (en) | 1995-05-09 | 1999-07-27 | Nokia Telecommunications Oy | Data transmission system with sliding-window data flow control |
US6031818A (en) * | 1997-03-19 | 2000-02-29 | Lucent Technologies Inc. | Error correction system for packet switching networks |
WO2000035163A1 (en) | 1998-12-08 | 2000-06-15 | Nokia Mobile Phones Ltd. | A method for optimizing of data transmission |
WO2000060799A1 (en) | 1999-04-06 | 2000-10-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Packet discard notification for semi reliable retransmission protocol |
US6289012B1 (en) | 1998-08-03 | 2001-09-11 | Instanton Corporation | High concurrency data download apparatus and method |
US6349208B1 (en) | 1999-04-28 | 2002-02-19 | Nokia Corporation | Apparatus and associated method for selectively permitting initiation or cell reselection in a radio communication system |
US6374117B1 (en) | 1999-12-22 | 2002-04-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Queue based power control scheduling |
US6493342B1 (en) * | 1998-09-11 | 2002-12-10 | Teledesic Llc | Method of data transmission in a data communication network |
US20030012178A1 (en) | 2001-04-06 | 2003-01-16 | Mussman Harry Edward | Alternate routing of voice communication in a packet-based network |
US6577642B1 (en) * | 1999-01-15 | 2003-06-10 | 3Com Corporation | Method and system for virtual network administration with a data-over cable system |
US20030174663A1 (en) | 2002-03-15 | 2003-09-18 | Douglas Dillon | Method and system for providing differentiated quality of service diversity ALOHA |
US6646987B1 (en) | 1998-10-05 | 2003-11-11 | Nortel Networks Limited | Method and system for transmission control protocol (TCP) packet loss recovery over a wireless link |
US20030212827A1 (en) * | 2002-05-08 | 2003-11-13 | Abheek Saha | Method and system for providing peer-to-peer exchange of terminal information over a meshed network |
US6697331B1 (en) | 1999-11-17 | 2004-02-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Link layer acknowledgement and retransmission for cellular telecommunications |
US20050022097A1 (en) | 2003-07-22 | 2005-01-27 | Jung-Fu Cheng | Adaptive hybrid ARQ algorithms |
US20050141419A1 (en) | 2003-06-17 | 2005-06-30 | Cisco Technology, Inc. A Corporation Of California | Methods and devices for the coordination of flow control between a TCP/IP network and other networks |
WO2005060200A1 (en) | 2003-12-17 | 2005-06-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Technique for handling outdated information units |
US6925096B2 (en) | 2000-09-22 | 2005-08-02 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for managing traffic flows |
US6937864B2 (en) | 2001-05-04 | 2005-08-30 | Samsung Electronics Co., Ltd. | Transmission apparatus and method for multimedia service in mobile communication system |
US7000021B1 (en) * | 2001-10-12 | 2006-02-14 | Cisco Technology, Inc. | ARQ (automatic repeat request) for broadband fixed wireless network |
US7020083B2 (en) | 2000-08-31 | 2006-03-28 | The Regents Of The University Of California | Method for improving TCP performance over wireless links |
US20060098659A1 (en) * | 2004-11-05 | 2006-05-11 | Silicon Graphics Inc. | Method of data packet transmission in an IP link striping protocol |
US7145889B1 (en) | 2002-03-28 | 2006-12-05 | Nortel Networks Limited | Efficient frame retransmission in a wireless communication environment |
US20070091908A1 (en) | 2001-11-01 | 2007-04-26 | Kabushiki Kaisha Toshiba | Communication device and communication control method using efficient echonet address determination scheme |
US7330439B1 (en) | 1999-05-21 | 2008-02-12 | Nokia Corporation | Packet data transmission in third generation mobile system |
US7394762B2 (en) | 2004-04-21 | 2008-07-01 | National University Of Ireland Maynooth | Congestion control in data networks |
US20080212510A1 (en) | 2005-07-07 | 2008-09-04 | Peter Larsson | Method and Arrangement for Coding and Scheduling in Packet Data Communication Systems |
US7428595B2 (en) | 2002-09-30 | 2008-09-23 | Sharp Laboratories Of America, Inc. | System and method for streaming TCP messages in an enterprise network |
US20080317017A1 (en) | 2004-08-31 | 2008-12-25 | Henning Wiemann | Data Unit Sender and Data Unit Relay Device |
US7787372B2 (en) | 2005-12-12 | 2010-08-31 | Viasat, Inc. | Transmission control protocol with performance enhancing proxy for degraded communication channels |
US7881205B2 (en) | 2007-01-24 | 2011-02-01 | Viasat, Inc. | Configurable delay limit for error control communications |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5629949A (en) * | 1993-09-21 | 1997-05-13 | Cirrus Logic, Inc. | Error correction verification method and apparatus using CRC check remainders |
JP3658829B2 (en) * | 1996-02-05 | 2005-06-08 | ソニー株式会社 | Data communication method |
-
2008
- 2008-01-24 EP EP08713973A patent/EP2119085B1/en not_active Not-in-force
- 2008-01-24 CN CN200880009461A patent/CN101641898A/en active Pending
- 2008-01-24 US US12/019,287 patent/US7920477B2/en active Active
- 2008-01-24 DE DE602008003100T patent/DE602008003100D1/en active Active
- 2008-01-24 US US12/019,297 patent/US8260935B2/en active Active
- 2008-01-24 AT AT08713973T patent/ATE485646T1/en not_active IP Right Cessation
- 2008-01-24 WO PCT/US2008/051941 patent/WO2008092023A2/en active Application Filing
- 2008-01-24 US US12/019,292 patent/US7881205B2/en active Active
Patent Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5109384A (en) | 1988-11-02 | 1992-04-28 | Tseung Lawrence C N | Guaranteed reliable broadcast network |
US5629948A (en) * | 1993-07-22 | 1997-05-13 | Ntt Mobile Communications Network Inc. | Data transmission scheme with automatic repeat request |
US5617561A (en) | 1994-12-22 | 1997-04-01 | International Business Machines Corporation | Message sequence number control in a virtual time system |
US5930233A (en) | 1995-05-09 | 1999-07-27 | Nokia Telecommunications Oy | Data transmission system with sliding-window data flow control |
US6031818A (en) * | 1997-03-19 | 2000-02-29 | Lucent Technologies Inc. | Error correction system for packet switching networks |
US6289012B1 (en) | 1998-08-03 | 2001-09-11 | Instanton Corporation | High concurrency data download apparatus and method |
US6493342B1 (en) * | 1998-09-11 | 2002-12-10 | Teledesic Llc | Method of data transmission in a data communication network |
US6646987B1 (en) | 1998-10-05 | 2003-11-11 | Nortel Networks Limited | Method and system for transmission control protocol (TCP) packet loss recovery over a wireless link |
WO2000035163A1 (en) | 1998-12-08 | 2000-06-15 | Nokia Mobile Phones Ltd. | A method for optimizing of data transmission |
US6577642B1 (en) * | 1999-01-15 | 2003-06-10 | 3Com Corporation | Method and system for virtual network administration with a data-over cable system |
WO2000060799A1 (en) | 1999-04-06 | 2000-10-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Packet discard notification for semi reliable retransmission protocol |
US6349208B1 (en) | 1999-04-28 | 2002-02-19 | Nokia Corporation | Apparatus and associated method for selectively permitting initiation or cell reselection in a radio communication system |
US7330439B1 (en) | 1999-05-21 | 2008-02-12 | Nokia Corporation | Packet data transmission in third generation mobile system |
US6697331B1 (en) | 1999-11-17 | 2004-02-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Link layer acknowledgement and retransmission for cellular telecommunications |
US6374117B1 (en) | 1999-12-22 | 2002-04-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Queue based power control scheduling |
US7020083B2 (en) | 2000-08-31 | 2006-03-28 | The Regents Of The University Of California | Method for improving TCP performance over wireless links |
US6925096B2 (en) | 2000-09-22 | 2005-08-02 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for managing traffic flows |
US20030012178A1 (en) | 2001-04-06 | 2003-01-16 | Mussman Harry Edward | Alternate routing of voice communication in a packet-based network |
US6937864B2 (en) | 2001-05-04 | 2005-08-30 | Samsung Electronics Co., Ltd. | Transmission apparatus and method for multimedia service in mobile communication system |
US7000021B1 (en) * | 2001-10-12 | 2006-02-14 | Cisco Technology, Inc. | ARQ (automatic repeat request) for broadband fixed wireless network |
US20070091908A1 (en) | 2001-11-01 | 2007-04-26 | Kabushiki Kaisha Toshiba | Communication device and communication control method using efficient echonet address determination scheme |
US20030174663A1 (en) | 2002-03-15 | 2003-09-18 | Douglas Dillon | Method and system for providing differentiated quality of service diversity ALOHA |
US7145889B1 (en) | 2002-03-28 | 2006-12-05 | Nortel Networks Limited | Efficient frame retransmission in a wireless communication environment |
US20030212827A1 (en) * | 2002-05-08 | 2003-11-13 | Abheek Saha | Method and system for providing peer-to-peer exchange of terminal information over a meshed network |
US7428595B2 (en) | 2002-09-30 | 2008-09-23 | Sharp Laboratories Of America, Inc. | System and method for streaming TCP messages in an enterprise network |
US20050141419A1 (en) | 2003-06-17 | 2005-06-30 | Cisco Technology, Inc. A Corporation Of California | Methods and devices for the coordination of flow control between a TCP/IP network and other networks |
US20050022097A1 (en) | 2003-07-22 | 2005-01-27 | Jung-Fu Cheng | Adaptive hybrid ARQ algorithms |
WO2005060200A1 (en) | 2003-12-17 | 2005-06-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Technique for handling outdated information units |
US7394762B2 (en) | 2004-04-21 | 2008-07-01 | National University Of Ireland Maynooth | Congestion control in data networks |
US20080317017A1 (en) | 2004-08-31 | 2008-12-25 | Henning Wiemann | Data Unit Sender and Data Unit Relay Device |
US20060098659A1 (en) * | 2004-11-05 | 2006-05-11 | Silicon Graphics Inc. | Method of data packet transmission in an IP link striping protocol |
US20080212510A1 (en) | 2005-07-07 | 2008-09-04 | Peter Larsson | Method and Arrangement for Coding and Scheduling in Packet Data Communication Systems |
US7787372B2 (en) | 2005-12-12 | 2010-08-31 | Viasat, Inc. | Transmission control protocol with performance enhancing proxy for degraded communication channels |
US7881205B2 (en) | 2007-01-24 | 2011-02-01 | Viasat, Inc. | Configurable delay limit for error control communications |
Non-Patent Citations (18)
Title |
---|
Andrei Gurtov, Reiner Ludwig: "Lifetime Packet Discard for Efficient Real-Time Transport over Cellular Links", Nov. 26, 2003, pp. 1-14. |
Final Office Action of Mar. 24, 2010 for U.S. Appl. No. 11/298,612; 8 pages. |
International Search Report dated Feb. 2, 2009, International Application No. PCT/US2008/051941, filed Jan. 24, 2008, 6 pages. |
Interview Summary of May 25, 2010 for U.S. Appl. No. 11/298,612; 5 pages. |
Invitation to Pay Additional Fees and, Where Applicable, Protest Fee, International Searching Authority, dated Jul. 23, 2008, corresponding to PCT Application No. PCT/US2008/051941, including results of the Partial International Search. |
Non-Final Office Action of Oct. 28, 2008 for U.S. Appl. No. 11/298,612; 19 pages. |
Non-Final Office Action of Sep. 16, 2009 for U.S. Appl. No. 11/298,612; 10 pages. |
Notice of Allowance of Apr. 30, 2010 for U.S. Appl. No. 11/298,612; 5 pages. |
Notice of Allowance of Dec. 6, 2010 for U.S. Appl. No. 12/019,287; 18 pages. |
Notice of Allowance of Nov. 3, 2010 for U.S. Appl. No. 12/019,292; 17 pages. |
Phoel W G: "Concepts for Reliable Satellite Communications Over Blockage Channels", IEEE Military Corrimunications Conference, Oct. 17, 2005-Oct. 20, 2005, pp. 1-6. |
Restriction Requirement of Jun. 4, 2009 for U.S. Appl. No. 11/298,612; 4 pages. |
Supplemental Notice of Allowability of Dec. 23, 2010 for U.S. Appl. No. 12/019,292; 3 pages. |
Supplemental Notice of Allowability of Jan. 31, 2011 for U.S. Appl. No. 12/019,287; 5 pages. |
U.S. Appl. No. 12/019,287, Office Action dated Jun. 23, 2010, 28 pages. |
U.S. Appl. No. 12/019,287, Office Action dated Oct. 29, 2009, 23 pages. |
U.S. Appl. No. 12/019,292, Office Action dated Apr. 27, 2010, 27 pages. |
Written Opinion of Jul. 24, 2009 for PCT Patent Application No. PCT/US2008/051941; 12 pages. |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220014500A1 (en) * | 2018-02-28 | 2022-01-13 | Palo Alto Networks, Inc. | Identifying security risks and enforcing policies on encrypted/encoded network communications |
US12095728B2 (en) * | 2018-02-28 | 2024-09-17 | Palo Alto Networks, Inc. | Identifying security risks and enforcing policies on encrypted/encoded network communications |
Also Published As
Publication number | Publication date |
---|---|
US20080177884A1 (en) | 2008-07-24 |
WO2008092023A2 (en) | 2008-07-31 |
US7920477B2 (en) | 2011-04-05 |
US20080175155A1 (en) | 2008-07-24 |
CN101641898A (en) | 2010-02-03 |
US7881205B2 (en) | 2011-02-01 |
WO2008092023A3 (en) | 2009-03-19 |
EP2119085A2 (en) | 2009-11-18 |
US20080175247A1 (en) | 2008-07-24 |
DE602008003100D1 (en) | 2010-12-02 |
EP2119085B1 (en) | 2010-10-20 |
ATE485646T1 (en) | 2010-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8260935B2 (en) | Error control terminal discovery and updating | |
US8958411B2 (en) | Method of transmitting RLC data | |
US8392616B2 (en) | Method and apparatus for transmitting header-compressed packet based on retransmission mechanism | |
JP5588019B2 (en) | Method and apparatus for analyzing a network abstraction layer for reliable data communication | |
US20170149675A1 (en) | Packet retransmission method and apparatus | |
AU2003276747B2 (en) | Method for moving a receive window in a radio access network | |
US9049017B2 (en) | Efficient TCP ACK prioritization in wireless networks | |
JP5215413B2 (en) | Status report for retransmission protocol | |
US20120140704A1 (en) | Method and apparatus for controlling downlink data transmission in a multi-hop relay communication system | |
US20120170445A1 (en) | Efficient application-layer automatic repeat request retransmission method for reliable real-time data streaming in networks | |
US8085669B2 (en) | Session relay device and session relay method | |
US10142206B2 (en) | Method and apparatus for packet communication using header compression | |
KR20070100196A (en) | Communication system, transmitter and receiver | |
JP2001308947A (en) | Communication device, repeater and communication control method | |
US20220225163A1 (en) | Communications device, infrastructure equipment and methods | |
JP2008153778A (en) | Packet transfer apparatus | |
US9510242B2 (en) | Reducing superfluous traffic in a network | |
Bhargava et al. | Analysis of Different Congestion Avoidance Algorithms | |
US20150071273A1 (en) | Efficient transfer of tcp traffic over wlan | |
Rocha et al. | Performance evaluation of DTSN in wireless sensor networks | |
WO2020154872A1 (en) | Transmission control protocol acceleration method and apparatus | |
JP3923977B2 (en) | Gateway device | |
JP2013157706A (en) | Radio communication device and communication control method | |
JP2005102340A (en) | Gateway apparatus | |
WO2008096908A1 (en) | Method of transmitting packet in low power wireless personal area network and low power wireless personal area network performing the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: VIASAT, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AGARWAL, ANIL;REEL/FRAME:020766/0851 Effective date: 20080404 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: UNION BANK, N.A., CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNOR:VIASAT, INC.;REEL/FRAME:028184/0152 Effective date: 20120509 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATE Free format text: SECURITY INTEREST;ASSIGNOR:VIASAT, INC.;REEL/FRAME:048715/0589 Effective date: 20190327 Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL TRUSTEE, MINNESOTA Free format text: SECURITY INTEREST;ASSIGNOR:VIASAT, INC.;REEL/FRAME:048715/0589 Effective date: 20190327 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: BANK OF AMERICA, N.A., NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNOR:VIASAT, INC.;REEL/FRAME:059332/0558 Effective date: 20220304 |
|
AS | Assignment |
Owner name: BANK OF AMERICA, N.A., AS AGENT, NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNOR:VIASAT, INC.;REEL/FRAME:063822/0446 Effective date: 20230530 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |